Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042511-31917-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82852000 PsLoadedModuleList = 0x8299a810
Debug session time: Mon Apr 25 11:59:00.447 2011 (UTC - 4:00)
System Uptime: 0 days 2:06:42.723
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
..........
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000046, The exception code that was not handled
Arg2: 828928d8, The address that the exception occurred at
Arg3: 89f03ba4, Exception Record Address
Arg4: 89f038d4, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for RTSTOR.SYS
*** ERROR: Module load completed but symbols could not be loaded for RTSTOR.SYS
EXCEPTION_CODE: (NTSTATUS) 0xc0000046 - An attempt to release a mutant object was made by a thread that was not the owner of the mutant object.
FAULTING_IP:
nt!KeReleaseMutant+215
828928d8 cc int 3
EXCEPTION_RECORD: 89f03ba4 -- (.exr 0xffffffff89f03ba4)
ExceptionAddress: 828928d8 (nt!KeReleaseMutant+0x00000215)
ExceptionCode: c0000046
ExceptionFlags: 00000001
NumberParameters: 0
CONTEXT: 89f038d4 -- (.cxr 0xffffffff89f038d4)
eax=c0000046 ebx=846f8d48 ecx=85f84200 edx=00000000 esi=85f84220 edi=00000000
eip=828928d8 esp=89f03c00 ebp=89f03c38 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000282
nt!KeReleaseMutant+0x215:
828928d8 cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x7E
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000046 - An attempt to release a mutant object was made by a thread that was not the owner of the mutant object.
LAST_CONTROL_TRANSFER: from 828926ba to 828928d8
STACK_TEXT:
89f03c38 828926ba 85f84220 00000001 00000000 nt!KeReleaseMutant+0x215
89f03c50 a71695ca 85f84220 00000000 86a6e0e7 nt!KeReleaseMutex+0x14
WARNING: Stack unwind information not available. Following frames may be wrong.
89f03c74 828bac53 85f84030 86a6e008 85f84030 RTSTOR+0x55ca
89f03cb8 9050402b 85a490e0 856e1a48 77485353 nt!IopfCompleteRequest+0x128
89f03ccc 904ea65d 85a49028 856140e8 8484d9f8 usbhub!UsbhPdoUnblockPendedD0IrpWI+0x87
89f03cec 82a72b25 85a49028 856e1a48 846f8d48 usbhub!UsbhHubWorker+0x51
89f03d00 828c003b 86702b80 00000000 846f8d48 nt!IopProcessWorkItem+0x23
89f03d50 82a609df 00000000 a44d810b 00000000 nt!ExpWorkerThread+0x10d
89f03d90 829121d9 828bff2e 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
FOLLOWUP_IP:
RTSTOR+55ca
a71695ca ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: RTSTOR+55ca
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: RTSTOR
IMAGE_NAME: RTSTOR.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 46ef7964
STACK_COMMAND: .cxr 0xffffffff89f038d4 ; kb
FAILURE_BUCKET_ID: 0x7E_RTSTOR+55ca
BUCKET_ID: 0x7E_RTSTOR+55ca
Followup: MachineOwner
---------